Hackers may have accessed personal data in Ubiquiti Networks breach

The security incident with a third-party cloud provider has forced the firm to ask users to reset passwords

Unknown hacker on a computer in a dark room

Ubiquiti Networks has informed customers that they must reset their passwords after detecting unauthorised access to certain corporate systems hosted by a third-party cloud provider.

Customers are being asked to change their passwords as a precautionary measure since the firm cannot rule out whether or not personal data was exposed, although no evidence of this has been found so far. 

Ubiquiti Networks manufactures networking equipment and IoT devices, including smart doorbells, Wi-Fi equipment and home surveillance hardware. Customers who purchase one of these produces can access forums or support materials by registering to the UI.com website, which also lets them manage devices remotely.

The data in question that may have been compromised includes a users' name, email address, and hashed and salted passwords, as well as postal address and phone number if these were provided. 

“We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed,” the company said in a statement on its forums. “We apologise for, and deeply regret, any inconvenience this may cause you. We take the security of your information very seriously and appreciate your continued trust.”

Although personal information may have been compromised in the suspected attack, its exact nature, the identity of the third-party cloud provider, or any of the timelines involved, haven’t yet been disclosed. There’s also no official confirmation on whether Ubiquiti Networks has contacted law enforcement or data protection authorities, or whether this is the responsibility of the cloud provider that sustained the breach.

It’s not uncommon for an organisation’s customers to be hit by a security incident affecting a third-party cloud provider, and was even the cause behind one of last year’s most significant cyber security horror stories

More than 120 organisations were affected, including UK universities, the Labour Party, Bletchley Park and a donkey sanctuary, after the cloud service provider Blackbaud suffered a ransomware attack. Not only did Blackbaud only inform its customers several months after detecting the attack, but it also revealed it had agreed to pay the ransom.

IT Pro has attempted to contact Ubiquiti Networks but the firm hadn’t responded at the time of publication.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Colonial Pipeline reportedly paid $5 million ransom
Security

Colonial Pipeline reportedly paid $5 million ransom

13 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021